Roundtable: The Edge Under Attack—Expert Insights on Adversary Behavior
was held on 27th February 2026
About the Security Event
Edge devices are increasingly targeted by adversaries operating with limited visibility and minimal traditional security controls. This expert led roundtable brings together specialists in threat intelligence, threat hunting, and detection engineering to examine how attackers exploit edge infrastructure for stealthy access, long term persistence, and large scale espionage. The discussion includes nation state activity, firmware level persistence, and the role of generative AI in accelerating vulnerability exploitation.
Speakers will explain why conventional controls often fail at the edge and how attackers leverage firmware abuse, credential access, and proxy infrastructure. Attendees will gain insight into identifying post compromise behavior and how detection engineers build signals from constrained edge telemetry.